DOI:10.20894/IJDMTA. Periodicity: Bi Annual. Impact Factor: SJIF:4.893 & GIF:0.787 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
Han, J. and Kamber M, "Data Mining Concepts and Techniques", Morgan Kaufmann ,2006 View Artical
Bose, N.K. and Liang, P, "Neural Networks Fundamental With Graphs Algorithms And Applications", Mcgraw-Hill: New York, NY ,1996 View Artical
Delmater R., and Handcock M, "Data Mining Explained: A Manager?s Guide to Customer- Centric Business Intelligence", Digital Press, Boston ,2001 View Artical
J. Neville, D. Jensen, J. Komoroske, K. Palmer, H. Goldberg, "Using Relational Knowledge Discovery to Prevent Securities Fraud", 11th ACM SIGKDD International Conference on Knowle ,2005 View Artical
Guilford, J. P, "The nature of human intelligence", New York:McGraw-Hill ,1967 View Artical
Hertz, J.K, "Introduction to the Theory Of Neural Computation", Addison ?Wesley: New York, NY. ,1991 View Artical
Phua, V. Lee, K. Smith, and R. Gayler, "A comprehensive survey of data mining-based fraud detection research", Artificial Intelligence Review ,2005 View Artical
Caruana, R. & Niculescu-Mizil, "Data Mining in Metric Space: An Empirical Analysis of Supervised Learning Performance Criteria", Proc. of SIGKDD04 ,2004 View Artical
T. Fawcett, F. Provost, "Activity monitoring: Noticing Interesting Changes in Behavior", In proceedings of SIGKDD99 ,1999 View Artical
S. Viaene, R. Derrig, G. Dedene, "A Case Study of Applying Boosting Naive Bayes to Claim Fraud Diagnosis", IEEE Transactions on Knowledge and Data Engineerin ,Vol.16 ,2004 View Artical
W. Lee, D. Xiang., "Information-theoretic Measures for Anomaly Detection", In proceedings of 2001 IEEE Symposium on Security ,2001 View Artical
K. Yamanishi, J. Takeuchi, G. Williams, P. Milne., "On- Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms", Journal of Data Mining and Knowledge Discovery ,Vol.8 ,2004 View Artical
P. Burge, J. Shawe-Taylor, "An Unsupervised Neural Network Approach to Profiling the Behavior of Mobile Phone Users for Use in F", Journal of Parallel and Distributed Computing ,Vol.61 ,2001 View Artical
R. Bolton, D. Hand., "Unsupervised Profiling Methods for Fraud Detection", In proceeding of Credit Scoring and Credit Control ,2001 View Artical
P. Chapman, J. Clinton, R. Kerber, T. Khabaza, T. Reinartz, C. Shearer, and R. Wirth., "CRISP-DM 1.0 Step-by-step data mining guide", The CRISP-DM consortium ,2000 View Artical